#
Client Generator (Build Your Own Botnet)
[-h] [-v] [--name NAME] [--icon ICON] [--pastebin API]
[--encrypt] [--obfuscate] [--compress] [--freeze]
host port [module [module ...]] ## # 🏴☠️ Generator (Build Your Own Botnet) ## ## 💥 Positional arguments: ## ⚡️ host server IP address ⚡️ port server port number ⚡️ module module(s) to remotely import at run-time ## ## 💥 Optional arguments : ### ⚡️ -h, --help
show this help message and exit ### ⚡️ -v, --version
show program's version number and exit ### ⚡️ --name NAME
output file name ### ⚡️ --icon ICON
icon image file name ### ⚡️ --pastebin API
upload & host payload on pastebin ### ⚡️ --encrypt
encrypt payload and embed key in stager ### ⚡️ --compress
zip-compress into a self-executing python script ### ⚡️ --freeze
compile client into a standalone executable for the current host platform ## ## 🏴☠️ Generate clients with the following features :
stager runs with just the python standard library
remotely import third-party packages from
the server without downloading/installing them
clients never write anything to the disk,
not even temporary files - zero IO system calls.
remote imports allow code/scripts/modules to
be dynamically loaded into memory and directly
imported into the currently running process
every python script, module, and package in the
`remote` directory is directl usable by every
client at all times while the server is running
use remote imports to add unlimited features without
adding a single byte to the client's file size
client periodically checks the content available
for remote import from the server, and will
dynamically update its in-memory resources
if anything has been added/removed
compatible with PyInstaller and package is authored
in Python, a platform agnostic language
connects to server via outgoing connections
(i.e. reverse TCP payloads) which most firewall
filters allow by default k
blocks any spawning process
with names of known antivirus products
main client payload encrypted with a random
256-bit key and is only
client will abort execution if a virtual machine
or sandbox is detected # # 🏴☠️ SERVER Console-based command & control server with a streamlined user-interface for controlling clients with reverse TCP shells which provide direct terminal access to the client host machines, as well as handling session authentication & management, serving up any scripts/modules/packages requested by clients to remotely import them, issuing tasks assigned by the user to any/all clients, handling incoming completed tasks from clients ## ## 💥 COMMANDS
### ⚡️ set
‘method’: self.set,
‘usage’: ‘set
### ⚡️ help ‘method’: self.help, ‘usage’: ‘help’, ‘description’: ‘show usage help for server commands’
### ⚡️ exit ‘method’: self.quit, ‘usage’: ‘exit’, ‘description’: ‘quit the server’
### ⚡️ debug
‘method’: self.debug,
‘usage’: ‘debug ',
'description': 'run python code directly on server (debugging MUST be enabled)'
### ⚡️ query
‘method’: self.query,
‘usage’: ‘query
### ⚡️ options ‘method’: self.settings, ‘usage’: ‘options’, ‘description’: ‘show currently configured settings’
### ⚡️ sessions ‘method’: self.session_list, ‘usage’: ‘sessions’, ‘description’: ‘show active client sessions’
### ⚡️ clients ‘method’: self.session_list, ‘usage’: ‘clients’, ‘description’: ‘show all clients that have joined the server’
### ⚡️ shell
‘method’: self.session_shell,
‘usage’: ‘shell
### ⚡️ ransom ‘method’: self.session_ransom, ‘usage’: ‘ransom [id]’, ‘description’: ‘encrypt client files & ransom encryption key for a Bitcoin payment’
### ⚡️ webcam
‘method’: self.session_webcam,
‘usage’: ‘webcam
### ⚡️ kill
‘method’: self.session_remove’
‘usage’: ‘kill
### ⚡️ broadcast
‘method’: self.task_broadcast,
‘usage’: ‘broadcast
### ⚡️ results ‘method’: self.task_list, ‘usage’: ‘results [id]’, ‘description’: ‘display all completed task results for a client (default: all clients)’
### ⚡️ tasks ‘method’: self.task_list, ‘usage’: ‘tasks [id]’, ‘description’: ‘display all incomplete tasks for a client (default: all clients)’